/mbedtls-3.5.0/library/ |
D | timing.c | 87 LARGE_INTEGER now, hfreq; in mbedtls_timing_get_timer() local 88 QueryPerformanceCounter(&now); in mbedtls_timing_get_timer() 90 delta = (unsigned long) ((now.QuadPart - t->start.QuadPart) * 1000ul in mbedtls_timing_get_timer() 107 struct timeval now; in mbedtls_timing_get_timer() local 108 gettimeofday(&now, NULL); in mbedtls_timing_get_timer() 109 delta = (now.tv_sec - t->start.tv_sec) * 1000ul in mbedtls_timing_get_timer() 110 + (now.tv_usec - t->start.tv_usec) / 1000; in mbedtls_timing_get_timer()
|
D | x509.c | 1004 static int x509_get_current_time(mbedtls_x509_time *now) in x509_get_current_time() argument 1016 now->year = lt->tm_year + 1900; in x509_get_current_time() 1017 now->mon = lt->tm_mon + 1; in x509_get_current_time() 1018 now->day = lt->tm_mday; in x509_get_current_time() 1019 now->hour = lt->tm_hour; in x509_get_current_time() 1020 now->min = lt->tm_min; in x509_get_current_time() 1021 now->sec = lt->tm_sec; in x509_get_current_time() 1076 mbedtls_x509_time now; in mbedtls_x509_time_is_past() local 1078 if (x509_get_current_time(&now) != 0) { in mbedtls_x509_time_is_past() 1082 return x509_check_time(&now, to); in mbedtls_x509_time_is_past() [all …]
|
D | ssl_client.c | 740 mbedtls_time_t now = mbedtls_time(NULL); in ssl_prepare_client_hello() local 741 uint64_t age = (uint64_t) (now - session_negotiate->ticket_received); in ssl_prepare_client_hello() 742 if (session_negotiate->ticket_received > now || in ssl_prepare_client_hello()
|
D | ssl_tls13_server.c | 119 mbedtls_time_t now; in ssl_tls13_offered_psks_check_identity_match_ticket() local 186 now = mbedtls_time(NULL); in ssl_tls13_offered_psks_check_identity_match_ticket() 188 if (now < session->start) { in ssl_tls13_offered_psks_check_identity_match_ticket() 192 (long long) now, (long long) session->start)); in ssl_tls13_offered_psks_check_identity_match_ticket() 196 age_in_s = (uint64_t) (now - session->start); in ssl_tls13_offered_psks_check_identity_match_ticket()
|
D | ssl_tls13_client.c | 931 mbedtls_time_t now = mbedtls_time(NULL); in mbedtls_ssl_tls13_write_identities_of_pre_shared_key_ext() local 934 (uint32_t) (now - session->ticket_received); in mbedtls_ssl_tls13_write_identities_of_pre_shared_key_ext()
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 48 …his has moved to `include/mbedtls/build_info.h`. From C code, both headers now define the `MBEDTLS… 62 ### Most structure fields are now private 82 If you were relying on these functions, you'll now need to change to using your 88 include `mbedtls/net_sockets.h` which now should be included directly. 201 The option `MBEDTLS_ECP_FIXED_POINT_OPTIM` now increases code size and it does 223 `MBEDTLS_SHA512_NO_SHA384` was disabled by default, now `MBEDTLS_SHA384_C` is 234 The GCM module now supports arbitrary chunked input in the multipart interface. 238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_… 239 * `mbedtls_gcm_update()` now takes an extra parameter to indicate the actual output length. In Mbed… 242 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block. This is neede… [all …]
|
D | use-psa-crypto.md | 71 This function only worked for a small number of ciphers. It is now deprecated
|
/mbedtls-3.5.0/ |
D | ChangeLog | 8 ssl_ciphersuites.c). The preferred cipher suite is now 12 * mbedtls_x509write_crt_set_serial() is now being deprecated in favor of 15 * PSA to mbedtls error translation is now unified in psa_util.h, 46 * SHA224_C/SHA384_C are now independent from SHA384_C/SHA512_C respectively. 63 * When a PSA driver for ECDSA is present, it is now possible to disable 78 * When a PSA driver for EC J-PAKE is present, it is now possible to disable 85 * AES-NI is now supported with Visual Studio. 86 * AES-NI is now supported in 32-bit builds, or when MBEDTLS_HAVE_ASM 91 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2 108 timing side-channel attacks. There is now an intrinsics-based AES-NI [all …]
|
D | CMakeLists.txt | 19 # We specify a minimum requirement of 3.10.2, but for now use 3.5.1 here
|
D | README.md | 180 You can now make the desired change:
|
/mbedtls-3.5.0/tests/scripts/ |
D | list-identifiers.sh | 64 check_names.py and is now self-complete.
|
/mbedtls-3.5.0/programs/test/cmake_package/ |
D | CMakeLists.txt | 30 # At this point, the Mbed TLS targets should have been imported, and we can now
|
/mbedtls-3.5.0/programs/test/cmake_package_install/ |
D | CMakeLists.txt | 33 # At this point, the Mbed TLS targets should have been imported, and we can now
|
/mbedtls-3.5.0/scripts/ |
D | windows_msbuild.bat | 6 @rem These parameters are hard-coded for now.
|
/mbedtls-3.5.0/programs/ssl/ |
D | CMakeLists.txt | 25 # propagate this information across the tree, for now it's only visible
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 246 We now need to create an abstraction for mixed-domain hash calculation. (We could not create an abs… 323 for now this is out of scope. 332 …tain either a legacy module's context (or a pointer to one, as is the case now), or a PSA context … 379 The job of this private function is to return 1 if `hash_alg` can be performed through PSA now, and… 405 #### Migration of modules that used to call MD and now do the legacy-or-PSA dance 409 #### Migration of modules that used to call a low-level hash module and now do the legacy-or-PSA da… 433 …TO_CONFIG` is disabled, this is already the case. When is enabled, we will now make it so as well.…
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_lmots.function | 211 /* Running another sign operation should fail, since the key should now have
|
D | test_suite_psa_crypto_slot_management.function | 176 /* Test that the key is now invalid. */ 323 * Test that the key handle and identifier are now not referring to an 995 * Check that we can now access the persistent key again.
|
D | test_suite_hmac_drbg.function | 211 /* And now the normal entropy-based variant */
|
D | test_suite_rsa.function | 492 /* And now with the copy */ 560 /* And now one more time with the copy */
|
D | test_suite_mps.function | 354 * should now succeed.
|
D | test_suite_psa_crypto.function | 6859 /* Flip a bit in the input and verify that the signature is now 7021 /* Flip a bit in the input and verify that the signature is now 7193 /* Flip a bit in the hash and verify that the signature is now detected 8000 /* Flip a bit in the input and verify that the signature is now
|
/mbedtls-3.5.0/docs/architecture/ |
D | tls13-support.md | 276 likely not to be used in prototype where we now would use them in
|
D | mbed-crypto-storage-specification.md | 223 * The layout of a key file now has a lifetime field before the type field.
|
/mbedtls-3.5.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 4 * Warning: This file is now auto-generated.
|